Name
Description
Link
Securing and Facilitating Trade in North America
AEO Programs have been developed by customs administrations throughout the North American region. In Canada, the program operates under the name Partners in Protection (PIP), in the United States it is known as Customs Trade Partnership Against Terrorism (CTPAT), and in Mexico the program is called Authorized Economic Operator (AEO).
Operations Management
Discover comprehensive operations management with topics on inventory, demand planning, supply chain management, capacity planning, quality control, JIT, and more.
CTPAT Best Practices
CTPAT Partners must exceed the minimum security criteria (MSC) to achieve Tier Three status. Previously, Members exceeded the MSC by complying with specific lists of best practices that CBP published. After extensive dialogue with the trade community, CTPAT determined that this approach both did not provide clear guidance and also established best practices that quickly became industry standards. The program, in consultation with the Trade, determined that a best practices framework created a more agile and effective process, since a framework – as opposed to a prescriptive list – allows companies to identify or build specific and unique best practices. For CTPAT purposes, a best practice must meet all five of the following requirements. The best practices framework was tested and validated by COAC Minimum Security Criteria Working Group members.
Supply Chain management and Logistics
Learn the essentials of supply chain and logistics management with AIMS Education. This free online course covers logistics fundamentals, supplier relationships, strategic planning, and more.
Les MOOC sur la cybersécurité
Les MOOC sur la cybersécurité
CTPAT Workshops and Events
CTPAT Workshops and Events
Sécurité CTPAT et sensibilisation aux dangers pour les chauffeurs
Sécurité CTPAT et sensibilisation aux dangers pour les chauffeurs
CTPAT : Passage frontalier réussi!
Strengthening the security of international supply chains by identifying vulnerabilities, adopting security practices, and collaborating to reduce risks related to terrorism, illicit trafficking, and so on.